Credential Guard and Kerberos delegation, (Mon, Dec 2nd)

The vast majority of red team exercises that I (and my team, of course) have been doing lately are assumed breach scenarios. In an assumed breach scenario (and we cover this in the amazing SEC565: Red Team Operations and Adversary Emulation SANS course that I also teach!) red team is usually given access as a non-privileged domain user, simulating an attacker that has someone already established the first foothold in the organization.

This article has been indexed from SANS Internet Storm Center, InfoCON: green

Read the original article:

Tags: